User Accounts

advertisement
1 User Accounts

All user accounts are to be defined in Active Directory

The built in administrator account must be configured in Admin approval mode in all
profiles. The following control needs to be set to enabled:
o Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\User Account Control: Admin Approval Mode
for the Built-in Administrator account

The ability admin users to complete tasks with elevated privileges needs to be
limited by setting the following control to “Prompt for Credentials”
o Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\User Account Control: Behavior of the
elevation prompt for administrators in Admin Approval Mode

The ability for standard users to complete tasks requiring elevated privileges
must be controlled by setting the following control to “Automatically deny
elevation requests”.
o Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\User Account Control: Behavior of the
elevation prompt for standard users.

The control that defines how windows responds to application installation
requests for all profiles must be controlled by setting the following parameter
to “enabled”.
o Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\User Account Control: Detect application
installations and prompt for elevation

The UAC elevation request must be displayed on the secure desktop. This is
done by setting the following parameters.
o Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\User Account Control: Switch to the secure
desktop when prompting for elevation – Set to enabled.
o The following parameter must be set to disabled. Computer
Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\User Account Control: Allow UIAccess
applications to prompt for elevation without using the secure desktop

Windows must be configured to virtualize file and registry writes to user
locations when a non UAC compliant application attempts to write to protected
Windows Server 2008 Security Standard
areas such as %SYSTEMROOT%. All profiles must have the following
parameter set to “Enabled”.
o Computer Configuration\Windows Settings\Security Settings\Local
Policies\Security Options\User Account Control: Virtualize file and
registry write failures to per-user locations
2 User Rights

All users must successfully authenticate to be granted access to the local server from
the network. This is enforced by setting the following control to “Administrators,
Authenticated Users”.
o

No process should be allowed to assume the identity of any other user. For all
profiles the following control must be set to “No one”.
o

Computer Configuration\Windows Settings\Security Settings\Local
Policies\User Rights Assignment\Change the system time
The user right that provides the ability to alter the access token object for any
process or logged on user must be restricted. The following control must be set to
‘no one’.
o

Computer Configuration\Windows Settings\Security Settings\Local
Policies\User Rights Assignment\Bypass traverse checking
The ability for users to change system date/time must be restricted. The following
control must be set to ‘LOCAL SERVICE, Administrators’.
o

Computer Configuration\Windows Settings\Security Settings\Local
Policies\User Rights Assignment\Back up files and directories
Users with no Traverse Folder access permission should be restricted from passing
thru folders as they browse NTFS or the registry. The following control must be set
to ‘Administrators, Authenticated users, Local Service, Network Service’.
o

Computer Configuration\Windows Settings\Security Settings\Local
Policies\User Rights Assignment\Act as part of the operating system
The ability of users to backup files and directories on the system should be restricted
to admin users. The following control must be set to administrators.
o

Computer Configuration\Windows Settings\Security Settings\Local
Policies\User Rights Assignment\Access this computer from the network
Computer Configuration\Windows Settings\Security Settings\Local
Policies\User Rights Assignment\Create a token object
Guest users should be denied access via the network. This is configured using the
following control.
Windows Server 2008 Security Standard
o

The ability to load and unload device drivers needs to be restricted to Administrators.
This is set using the following control.
o

Computer Configuration\Windows Settings\Security Settings\Local
Policies\User Rights Assignment\Replace a process level token.
Access to local logon should be restricted to Administrator users only. The following
control must be set to ‘Administrators’.
o

Computer Configuration\Windows Settings\Security Settings\Local
Policies\User Rights Assignment\Profile single process.
Users should not have the ability to start another service or process with a different
security access token. For all profiles the following control should be set to ‘LOCAL
SERVICE, NETWORK SERVICE’.
o

Computer Configuration\Windows Settings\Security Settings\Local
Policies\User Rights Assignment\Perform volume maintenance tasks
The ability to use tools to monitor the performance of non-system processes should
be restricted to administrators. For all profiles the following control should be set to
‘Administrators’.
o

Computer Configuration\Windows Settings\Security Settings\Local
Policies\User Rights Assignment\Modify firmware environment values
The ability to perform system volume maintenance tasks should be restricted to
administrators users. The following control must be set to administrators.
o

Computer Configuration\Windows Settings\Security Settings\Local
Policies\User Rights Assignment\Manage auditing and security log.
The ability to configure system wide environment variables that affect hardware
configuration must be restricted to administrators. The following control must be set
to administrators.
o

Computer Configuration\Windows Settings\Security Settings\Local
Policies\User Rights Assignment\Load and unload device drivers
The ability for users to change auditing options for files and directories must be
restricted. The following control must be set to ‘Administrators’.
o

Computer Configuration\Windows Settings\Security Settings\Local
Policies\User Rights Assignment\Deny access to this computer from the
network.
Computer Configuration\Windows Settings\Security Settings\Local
Policies\User Rights Assignment\Allow log on locally
Access to Terminal Services logon must be restricted. It is recommended that
access is restricted to Administrator users only using the following control.
Windows Server 2008 Security Standard
o

Access to change the time zone must be restricted to ‘LOCAL SERVICE and
Administrators’ only. The following control must be set.
o

Computer Configuration\Windows Settings\Security Settings\Local
Policies\User Rights Assignment\Restore files and directories
User accounts should not be able to bypass normal access control lists to take
ownership of files and other objects. For all profiles change the following control to
‘Administrators’.
o

Computer Configuration\Windows Settings\Security Settings\Local
Policies\User Rights Assignment\Increase a process working set.
Normal users must not be able to bypass file, directory and other object permissions.
The following control must be set to ‘Administrators’.
o

Computer Configuration\Windows Settings\Security Settings\Local
Policies\User Rights Assignment\Change the time zone
Access to change the size of a process’ working set must be restricted. The
following control must be changed to ‘Administrators, Local Service’.
o

Computer Configuration\Windows Settings\Security Settings\Local
Policies\User Rights Assignment\Allow log on through Terminal Services
Computer Configuration\Windows Settings\Security Settings\Local
Policies\User Rights Assignment\Take ownership of files or other objects
Normal users should not be able to access user credentials via user credential
manager. For all profiles the following control must be set to ‘No One’.
o
Computer Configuration\Windows Settings\Local Policies\User Rights
Assignment\Access credential Manager as a trusted caller.
3 Security Options
The table below lists the windows security options that must be configured on all Windows
2008 servers.
Description
Set to Value
Windows setting
Set minimum session
security for NTLM SSP
based servers
Require NTLMv2 session security,
require 128 bit encryption
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Network security:
Minimum session security for NTLM SSP
based (including secure RPC) servers
Rename default
administrator account.
A non default value eg: ‘NSC-admin’
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Accounts: Rename
Windows Server 2008 Security Standard
administrator account
The default Guest
account should be
disabled
Disabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Accounts: Guest
account status.
Disable anonymous
SID/Name translation
Disabled
Computer Configuration\Windows
Settings\Local Policies\Security
Options\Network access: Allow anonymous
SID/Name translation
Disable remote
authentication using
blank passwords.
disable
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Accounts: Limit
local account use of blank passwords to
console logon only
Restrict authority to
remove NTFS
formatted media
Administrators
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Devices: Allowed to
format and eject removable media
Prevent users from
installing printer drivers
Enabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Devices: Prevent
users from installing printer drivers
Restrict CD-ROM
access to locally
logged-on user only
Restrict CD-ROM
access to locally
logged-on user only
Disabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Devices: Restrict
CD-ROM access to locally logged-on user
only
Digitally encrypt or
sign secure channel
data
Enabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Domain member:
Digitally encrypt or sign secure channel data
(always)
Disable machine
account password
changes
Disabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Domain member:
Disable machine account password changes
Do not display last
user name
Enabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Interactive logon:
Do not display last user name
Message text for users
attempting to log on
Appropriate NSC login banner
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Interactive logon:
Message text for users attempting to log on
Digitally sign SMB
communications
Enabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Microsoft network
client: Digitally sign communications (always)
Windows Server 2008 Security Standard
Microsoft network
client: Digitally sign
communications (if
server agrees)
Enabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Microsoft network
client: Digitally sign communications (if server
agrees)
Send unencrypted
password to third-party
SMB servers
Disabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Microsoft network
client: Send unencrypted password to thirdparty SMB servers
Amount of idle time
required before
suspending session
15 minutes
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Microsoft network
server: Amount of idle time required before
suspending session
Digitally sign
communications
(always)
Enabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Microsoft network
server: Digitally sign communications
(always)
Do not allow
anonymous
enumeration of SAM
accounts
Enabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Network access: Do
not allow anonymous enumeration of SAM
accounts
Do not allow storage of
credentials or .NET
Passports for network
authentication
Enabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Network access: Do
not allow storage of credentials or .NET
Passports for network authentication
Let Everyone
permissions apply to
anonymous users
Disabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Network access: Let
Everyone permissions apply to anonymous
users
Named Pipes that can
be accessed
anonymously
Browser
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Network access:
Named Pipes that can be accessed
anonymously
Remotely accessible
registry paths
System\CurrentControlSet\Control\Pro
ductOptions
System\CurrentControlSet\Control\Ser
ver Applications
Software\Microsoft\Windows
NT\CurrentVersion
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Network access:
Remotely accessible registry paths
Restrict anonymous
access to Named
Pipes and Shares
Enabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Network access:
Restrict anonymous access to Named Pipes
Windows Server 2008 Security Standard
and Shares
Shares that can be
accessed
anonymously
None
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Network access:
Shares that can be accessed anonymously
Do not store LAN
Manager hash value
on next password
change
Enabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\Network security:
Do not store LAN Manager hash value on
next password change
Strengthen default
permissions of internal
system objects
Enabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\System objects:
Strengthen default permissions of internal
system objects (e.g. Symbolic Links)
Force strong key
protection for user
keys stored on the
computer
User must enter a password each
time they use a key
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\System
cryptography: Force strong key protection for
user keys stored on the computer
Optional subsystems
None
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\System settings:
Optional subsystems
Use Certificate Rules
on Windows
Executables for
Software Restriction
Policies
Enabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\System settings:
Use Certificate Rules on Windows
Executables for Software Restriction Policies
(AutoAdminLogon)
Enable Automatic
Logon (not
recommended)
Disabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\MSS:
(AutoAdminLogon) Enable Automatic Logon
(not recommended)
(DisableIPSourceRouti
ng) IP source routing
protection level
(protects against
packet spoofing)
Highest protection, source routing is
completely disabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\MSS:
(DisableIPSourceRouting) IP source routing
protection level (protects against packet
spoofing)
Allow ICMP redirects
to override OSPF
generated routes
Disable
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\MSS:
(EnableICMPRedirect) Allow ICMP redirects
to override OSPF generated routes
Enable the computer
to stop generating 8.3
style filenames
(recommended)
Enabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\MSS:
(NtfsDisable8dot3NameCreation) Enable the
computer to stop generating 8.3 style
Windows Server 2008 Security Standard
filenames (recommended)
Enable Safe DLL
search mode
(recommended)
Enabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\MSS:
(SafeDllSearchMode) Enable Safe DLL
search mode (recommended)
How many times
unacknowledged data
is retransmitted
3
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\MSS:
(TCPMaxDataRetransmissions) How many
times unacknowledged data is retransmitted
(3 recommended, 5 is default)
IPv6 IP source routing
protection level
Highest protection, source routing is
completely disabled
Computer Configuration\Windows
Settings\Security Settings\Local
Policies\Security Options\MSS:
(DisableIPSourceRouting IPv6) IP source
routing protection level (protects against
packet spoofing)
4 Terminal Services
The table below lists the Terminal Services security options that must be configured on all
Windows 2008 servers that utilize terminal services.
Description
Set to Value
Windows setting
Always prompt client for password
upon connection
enabled
Computer
Configuration\Administrative
Templates\Windows
Components\Terminal
Services\Terminal
Server\Security\Always prompt
client for password upon
connection
Set client connection encryption
level
Enabled:High level.
Computer
Configuration\Administrative
Templates\Windows
Components\Terminal
Services\Terminal
Server\Security\Set client
connection encryption level
Do not allow drive redirection
Enabled
Computer
Configuration\Administrative
Templates\Windows
Components\Terminal
Services\Terminal Server\Device
and Resource Redirection\Do not
allow drive redirection
Do not allow passwords to be
saved
Enabled
Computer
Configuration\Administrative
Templates\Windows
Windows Server 2008 Security Standard
Components\Terminal
Services\Remote Desktop
Connection Client\Do not allow
passwords to be saved
5 Auditing
The table below lists the Audit security options that must be configured on all Windows 2008
servers.
Description
Set to Value
Windows setting
enabled
Force audit policy subcategory
settings
Computer Configuration\Windows Settings\Security
Settings\Local Policies\Security Options\Audit: Force
audit policy subcategory settings (Windows Vista or
later) to override audit policy category settings.
This control defines whether
Internet Protocol security (IPsec)
driver activity is audited
Success and
Failure
Computer Configuration\Windows Settings\Security
Settings\Advanced Audit Policy
Configuration\System Audit Policies - Local Group
Policy Object\System\Audit IPSec Driver\Audit
Policy: System: IPsec Driver
This control defines whether the
audit is activated for changes in
the security state of the system.
Success and
Failure
Computer Configuration\Windows Settings\Security
Settings\Advanced Audit Policy
Configuration\System Audit Policies - Local Group
Policy Object\System\Audit Security State
Change\Audit Policy: System: Security State Change
This control defines whether the
audit is activated for the loading of
extension code such as
authentication packages by the
security subsystem.
Success and
Failure
Computer Configuration\Windows Settings\Security
Settings\Advanced Audit Policy
Configuration\System Audit Policies - Local Group
Policy Object\System\Audit Security System
Extension\Audit Policy: System: Security System
Extension
This control defines whether the
audit is activated for violations of
integrity of the security subsystem.
Success and
Failure
Computer Configuration\Windows Settings\Security
Settings\Advanced Audit Policy
Configuration\System Audit Policies - Local Group
Policy Object\System\Audit System Integrity\Audit
Policy: System: System Integrity
This control defines whether the
audit is activated for when a user
logs off from the system.
Success
Computer Configuration\Windows Settings\Security
Settings\Advanced Audit Policy
Configuration\System Audit Policies - Local Group
Policy Object\Logon/Logoff\Audit Logoff\Audit Policy:
Windows Server 2008 Security Standard
Logon-Logoff: Logoff
This control defines whether the
audit is activated for when a user
attempts to log on to the system.
This control defines whether the
audit is activated when a special
logon is used
This control defines whether the
audit is activated when file objects
are accessed
This control defines whether the
audit is activated when registry
objects are accessed.
This control defines whether the
audit is activated when a user
account or service uses a sensitive
privilege
Success and
Failure
Success
Computer Configuration\Windows Settings\Security
Settings\Advanced Audit Policy
Configuration\System Audit Policies - Local Group
Policy Object\Logon/Logoff\Audit Logon\Audit Policy:
Logon-Logoff: Logon
Computer Configuration\Windows Settings\Security
Settings\Advanced Audit Policy
Configuration\System Audit Policies - Local Group
Policy Object\Logon/Logoff\Audit Special
Logon\Audit Policy: Logon-Logoff: Special Logon
Failure
Computer Configuration\Windows Settings\Security
Settings\Advanced Audit Policy
Configuration\System Audit Policies - Local Group
Policy Object\Object Access\Audit File System\Audit
Policy: Object Access: File System
Failure
Computer Configuration\Windows Settings\Security
Settings\Advanced Audit Policy
Configuration\System Audit Policies - Local Group
Policy Object\Object Access\Audit Registry\Audit
Policy: Object Access: Registry
Success and
Failure
Computer Configuration\Windows Settings\Security
Settings\Advanced Audit Policy
Configuration\System Audit Policies - Local Group
Policy Object\Privilege Use\Audit Sensitive Privilege
Use\Audit Policy: Privilege Use: Sensitive Privilege
Use
This control defines whether the
audit is activated when a process
is created and the name of the
program that created it.
Success
Computer Configuration\Windows Settings\Security
Settings\Advanced Audit Policy
Configuration\System Audit Policies - Local Group
Policy Object\Detailed Tracking\Audit Process
Creation\Audit Policy: Detailed Tracking: Process
Creation
This control defines whether the
audit is activated when change in
audit policy including SACL
changes occur
Success and
Failure
Computer Configuration\Windows Settings\Security
Settings\Advanced Audit Policy
Configuration\System Audit Policies - Local Group
Policy Object\Policy Change\Audit Audit Policy
Change\Audit Policy: Policy Change: Audit Policy
Windows Server 2008 Security Standard
Change
This control defines whether the
audit is activated when changes in
authentication policy occur
This control defines whether the
audit is activated when a computer
account management event, such
as a create, change, rename,
delete, disable or enable event
occurs
This control defines whether the
audit is activated when an account
management event occurs
This control defines whether the
audit is activated when a security
group management event, such as
a create, change or delete event
occurs
This control defines whether the
audit is activated when an AD DS
object is accessed
Success
Success and
Failure
Computer Configuration\Windows Settings\Security
Settings\Advanced Audit Policy
Configuration\System Audit Policies - Local Group
Policy Object\Account Management\Audit Computer
Account Management\Audit Policy: Account
Management: Computer Account Management
Success and
Failure
Computer Configuration\Windows Settings\Security
Settings\Advanced Audit Policy
Configuration\System Audit Policies - Local Group
Policy Object\Account Management\Audit Other
Account Management Events\Audit Policy: Account
Management: Other Account Management Events
Success and
Failure
Computer Configuration\Windows Settings\Security
Settings\Advanced Audit Policy
Configuration\System Audit Policies - Local Group
Policy Object\Account Management\Audit Security
Group Management\Audit Policy: Account
Management: Security Group Management
Success and
Failure
Computer Configuration\Windows Settings\Security
Settings\Advanced Audit Policy
Configuration\System Audit Policies - Local Group
Policy Object\DS Access\Audit Directory Service
Access\Audit Policy: DS Access: Directory Service
Access
(DC only)
This control defines whether the
audit is activated when changes in
Active Directory Domain Services
(AD DS) occur
Computer Configuration\Windows Settings\Security
Settings\Advanced Audit Policy
Configuration\System Audit Policies - Local Group
Policy Object\Policy Change\Audit Authentication
Policy Change\Audit Policy: Policy Change:
Authentication Policy Change
Success and
Failure
(DC Only)
Computer Configuration\Windows Settings\Security
Settings\Advanced Audit Policy
Configuration\System Audit Policies - Local Group
Policy Object\DS Access\Audit Directory Service
Changes\Audit Policy: DS Access: Directory Service
Changes
Success and
Failure
This control defines whether the
audit is activated to report the
results of validation tests on
(DC Only)
Computer Configuration\Windows Settings\Security
Settings\Advanced Audit Policy
Configuration\System Audit Policies - Local Group
Windows Server 2008 Security Standard
credentials submitted by a user
account logon request
Policy Object\Account Logon\Audit Credential
Validation\Audit Policy: Account Logon: Credential
Validation
Windows Server 2008 Security Standard
6 Internet Communication
The table below lists the windows security options that must be configured on all Windows
2008 servers.
Description
Set to Value
Windows setting
Turn off downloading of print
drivers over HTTP
Enabled
Computer
Configuration\Administrative
Templates\System\Internet
Communication
Management\Internet
Communication settings\Turn off
downloading of print drivers over
HTTP
Turn off the "Publish to Web" task
for files and folders
Enabled
Computer
Configuration\Administrative
Templates\System\Internet
Communication
Management\Internet
Communication settings\Turn off
the "Publish to Web" task for files
and folders
Turn off Internet download for Web
publishing and online ordering
wizards
Enabled
Computer
Configuration\Administrative
Templates\System\Internet
Communication
Management\Internet
Communication settings\Turn off
Internet download for Web
publishing and online ordering
wizards
Turn off printing over HTTP
enabled
Computer
Configuration\Administrative
Templates\System\Internet
Communication
Management\Internet
Communication settings\Turn off
printing over HTTP
Turn off Search Companion content
file updates
Enabled
Computer
Configuration\Administrative
Templates\System\Internet
Communication
Management\Internet
Communication settings\Turn off
Search Companion content file
updates
Turn off the Windows Messenger
Customer Experience Improvement
Program
Enabled
Computer
Configuration\Administrative
Templates\System\Internet
Communication
Management\Internet
Windows Server 2008 Security Standard
Communication settings\Turn off
the Windows Messenger Customer
Experience Improvement Program
Turn off Windows Update device
driver searching
Enabled
Computer
Configuration\Administrative
Templates\System\Internet
Communication
Management\Internet
Communication settings\Turn off
Windows Update device driver
searching
Do not process the legacy run list
Enabled
Computer
Configuration\Administrative
Templates\System\Logon\Do not
process the legacy run list
Do not process the run once list
Enabled
Computer
Configuration\Administrative
Templates\System\Logon\Do not
process the run once list
Offer Remote Assistance
Disabled
Computer
Configuration\Administrative
Templates\System\Remote
Assistance\Offer Remote
Assistance
Solicited Remote Assistance
Disabled
Computer
Configuration\Administrative
Templates\System\Remote
Assistance\Solicited Remote
Assistance
RPC Endpoint Mapper Client
Authentication
Not defined
Computer
Configuration\Administrative
Templates\System\Remote
Procedure Call\RPC Endpoint
Mapper Client Authentication
Turn off Autoplay
Enabled:All drives
Computer
Configuration\Administrative
Templates\Windows
Components\AutoPlay
Policies\Turn off Autoplay
Enumerate administrator accounts
on elevation
Disabled
Computer
Configuration\Administrative
Templates\Windows
Components\Credential User
Interface\Enumerate administrator
accounts on elevation
Require trusted path for credential
entry
Enabled
Computer
Configuration\Administrative
Templates\Windows
Components\Credential User
Interface\Require trusted path for
Windows Server 2008 Security Standard
credential entry
Disable remote Desktop Sharing
Enabled
Computer
Configuration\Administrative
Templates\Windows
Components\NetMeeting\Disable
remote Desktop Sharing
7 Enforcement of Standard Configuration
Security is an ongoing process, to ensure the ongoing enforcement of this standard
configuration, the following processes apply:

An ongoing process of review of server configuration will be carried out on a
annual basis.
Download